SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does IP Helper service has to run for?
IPV6 transition technologies
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
DNS suffix search lists
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
2. What is another way to deploy an application compatibility database across multiple computers?
It pings with IPV6
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
They can place quotas on folders/volumes - activity screen files - and generate comprehensive storage reports. This assists in not only monitoring existing resource but helping on future planning.
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
3. What does the NEW-PSSESSION powershell applet do?
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
It improves performance
Create persistent connections to computers with POWERSHELL
4. What is exFAT?
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
Restrict the share permissions of the DFS root share.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
5. How do you make a Windows 7 Answer File used for unattended setup?
Perform an offline migration
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
Create a customized shell
Use the Advanced Firewall to define Connection Security Rules.
6. What does PNPUTIL.EXE do?
Yes
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
7. What do quota templates do?
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
vssadmin.exe. This can view previous version files as well.
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
8. What is the command to add a DNS server?
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Use AD integrated zones so the clients can update to more than one DNS server.
Does not have
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
9. How do you install applications in Windows XP Mode?
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
Windows Aero was revised to be more touch-friendly.
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
10. Why would you use audit-only mode?
To deploy the policy and understand its impact before enforcing it.
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
11. What does Internet Explorer store while you are surfing using InPrivate Browsing?
Enterprise Admins
Create a customized shell
Windows 7 Ultimate.
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
12. What is BCDEdit?
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
Use the Advanced Firewall to define Connection Security Rules.
13. What should you do to provide redundancy in DNS dynamic updates?
Use AD integrated zones so the clients can update to more than one DNS server.
WECUTIL QC
Add an AD integrated zone
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
14. How do you enable a recovery agent?
Create persistent connections to computers with POWERSHELL
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
15. You can still ___________ if root hints are disabled.
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
Forward to another DNS server
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
A file that is loaded when a DNS server starts up and populate the root hints.
16. How does Transparent Caching lead to improved end-user response times and decreased bandwidth consumption over the WAN links to the server?
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
Setup a GlobalNames zone.
17. What does "Create System Repair Disk" option do?
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
They are monitored but not enforced. Users can exced there quota limit.
It improves performance
18. What does DRIVERQUERY /SI do?
It will display driver signing status
Migrates EFS encrypted files?
No
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
19. What are hard disk quotas?
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Either from wbadmin or windows server backup.
they are enforced and will not allow a user to exceed the space limit.
Use the net sh command to configure the proper ports for remote management.
20. What does windows cardspace do?
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
Drop both inbound and outbound traffic
It backs up digitally identities to a password protected file.
21. What are the proven - standards-based technologies that DirectAccess is built on?
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
Encapsulating Security payload protocol used for encryption the packets created by the AH.
1723
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
22. What do NAP clients do?
Windows XP and Server 2003.
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
23. How do you initiate a zone transfer?
Use dnscmd /zonerefresh.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Use the Import Foreign Disk option on the target computer
Problem history but also application installation history.
24. What is SSTP?
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
By using the dnscmd /zoneexport command.
Anew vpn protocol that uses SSL (port 443) for encryption.
25. In case the _______________ - DHCP clients can be configured with an alternative static ip address?
Windows PE and Windows.old.
DHCP server cannot assign an ip address
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
Use the Advanced Firewall to define Connection Security Rules.
26. How do you calculate the original subnet mask of a network that was divided in to multiple networks?
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
27. How many bits are in the GLOBAL/UNIQUE LOCAL prefix?
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Use the Cipher.exe command line tool.
They are in the first 48 bits /48
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
28. What type of router can RRAS be configured as?
Pool Active Directory.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
A LAN Router only or a LAN to WAN Router
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
29. You can configure process monitor alerts to _____.
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
Which processes currently consume a resource like processor utilization.
Run scripts
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
30. What does WinRS do?
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
31. What does the MigApp.xml file do?
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
Only a local administrator
32. How do you block all traffic for a specific port in windows firewall?
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
Vista SP1 and Server 2008 and above.
It contains new capabilities and extensions that you can: Define rules based on file attributes - Create exceptions to rules - Import and export rules - and use audit-only mode.
Configure a firewall rule to the specific port and block all connections.
33. What does Scanstate /GENMIGXML do?
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
It create a report of which files will be migrated
Use AD integrated zones so the clients can update to more than one DNS server.
34. The print management console can be configured to _____________.
Send email notifications
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
35. How do you review files in the Offline Files Cache?
It can add a driver to an offline WIM image with the /Add-Driver option
By running the Update Status summary report.
Use SYNC Center
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
36. Use ocsetup instead of servermanagercmd.exe _________.
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
On a core server
IPV6 transition technologies
37. How can you communicate accross the IPV6 accross a IPV4 network?
Pool Active Directory.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
38. What does Windows uses the index for?
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
By unbinding the DHCP protocol from the nic attached to the subnet.
Run: Cscript slmgr.vbs /dl
39. What can In-Private Browsing not display?
By using the dnscmd /zoneexport command.
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
Computer certificates be installed on client computers
Suggested Sites
40. What does Cipher /K do?
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
Use it to generate an EFS user certificate
It is a network health policy defines the minumum level of client health required to connect to the network.
41. What is terminal server network level authentication?
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
It can add a driver to an offline WIM image with the /Add-Driver option
IPSEC
42. What does the Hosted Cache mode do?
It improves performance
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
Internet printing protocol. Used for connecting to printers via web browser.
43. How do you set a DNS server to a cache only DNS server?
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
Delete all the zone files or reinstall the DNS service.
To another hard disk in the same computer - network or to removable media.
Windows 7 Enterprise and Ultimate Editions
44. How do you remove a resource record from a zone file?
1723
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
Use dnscmd /recorddelete
45. How do you restore a System Image from backup?
No they are disabled
an email address where the @ is replaced with a period.
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
1723
46. You can configure ____________ in group policy.
Ping the Link Local Address (FE80 Address)
No they are disabled
DNS suffix search lists
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
47. What is a split tunnel VPN?
Does not have
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
48. How do you setup multiple mx records?
Default Programs Control Panel applet
It is a network health policy defines the minumum level of client health required to connect to the network.
Sett up a priority for the preferred smtp server.
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
49. How are RRAS/NPS policies evaluated?
Not supported
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
Create a customized shell
50. What do you do if the Operating System won't start due to a corrupt driver?
an email address where the @ is replaced with a period.
Either from wbadmin or windows server backup.
Use Safe Mode and then roll back the driver if it was recently updated.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.